The first phase of the process begins with analyzing a vulnerability and the feasibility of manipulating this vulnerability for our own purposes. The Metasploit Framework is more potent for network based exploitation, which is generally difficult.

I'm using Metasploit Framework2.7 for a long time, and I find it reallly helpful.The only pity about Metasploit Framework is that it never support Chinese systems.Why? Don't forget that Chinese hackers' number is more than you imagine.